28. June 2021

5G Security Vulnerabilities Fluster Mobile Operators

Mozilla Launches Privacy-Focused Browsing Data Sharing Platform

Threat Actor Abuses Microsoft’s WHCP to Sign Malicious Drivers

Attacks Erase Western Digital Network-Attached Storage Drives

Binance receives the ban hammer from UK’s FCA

NVIDIA Patches High-Severity GeForce Spoof-Attack Bug

SolarWinds hackers compromised Microsoft support agent

Welcoming the Slovak Republic Government to Have I Been Pwned

June 2021 Patch Tuesday Roundup

Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+

How I Seized McAfee’s Opportunities to Realize My Potential

5 Ransomware Threats Canadians Need to Know

DOD to send AI data teams to combatant commands this summer

Attackers Breach Microsoft Customer Service Accounts

Microsoft Tracks Attack Campaign Against Customer Support Agents

New House Bill Aims to Drive Americans’ Security Awareness

Apple’s Kevin Lynch Explains How IDs Will Work on Apple Watch in watchOS 8

Microsoft approved a Windows driver booby-trapped with rootkit malware

NIST details executive order’s ‘critical software’ categories

Report: Facebook Allows Fake Testimonials In Its Ads

Xbox Cloud Gaming Service Now Available on iOS Devices Through Safari

‘You can’t play perfect defense every day,’ says FireEye CEO of ransomware attacks

New Ransomware Variant Uses Golang Packer

Task force clears the way for vaccinated feds to travel

Minimizing insider threats with open-source intelligence

Ransomware attackers pressure Tulsa by releasing PII

Russian Attackers Breach Microsoft Customer Service Accounts

Cybersecurity study: SolarWinds attack cost affected companies an average of $12 million

SolarWinds Hackers Continue Assault With New Microsoft Breach

US the Only Top Tier Cyber-power

An Interesting Approach to Cyber Insurance

Apple Now Offering Developers Access to Xcode Cloud

Remembering the Khobar Towers Bombing

The Promise and Pitfalls of a Coronavirus Commission

Better defense, better offense: TrustedSec CEO on preventing ransomware attacks

How Does World’s Highly Secured Google Network Works? Google’s Effort & Dedication

Hassan, Cornyn float bill to create new federal cybersecurity training programs

The Danger of Action Bias: Is It Always Better to Act Quickly?

CFBF Files Strings Analysis, (Mon, Jun 28th)

Benefits of CI/CD for Your Software Development Company

What is Roblox and is It Safe for Kids?

DOD may be ‘overly optimistic’ with IT program risks, GAO says

Cyber insurance isn’t helping with cybersecurity, and it might be making the ransomware crisis worse, say researchers

Supreme Court Says You Can’t Sue the Corporation that Wrongly Marked You A Terrorist

Additional Entities Targeted by DarkSide Affiliate, TAG-21; Links to WellMess and Sliver Infrastructure

Apple Seeds Second Beta of macOS 12 Monterey to Developers

BrandPost: Edge Computing: The Security Imperative

Microsoft Signs Malware That Spreads Through Gaming

How developing mental immunity can help you make better cybersecurity decisions

Like Their Adversaries, Threat Hunters Need Anonymity

Deals: Anker Discounts Collection of Charging Accessories and Bluetooth Speaker in New Sale

YouTube TV Gains Support for 4K Streaming and 5.1 Surround Sound

Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail

In the Midst of COVID-19, We’re Seeing a Pandemic of Cyber Attacks

How to achieve financial inclusion with Open Banking

Asset management in the age of digital transformation

Hacker wipes out database of RSS newsreader service NewsBlur

public key

Cyber insurance isn’t helping with cybersecurity, says report. And it might be making the ransomware crisis worse

Zero-day Exploit Found in Adobe Experience Manager

Vulnerability Summary for the Week of June 21, 2021

Did your WD My Book NAS get Wiped? Put a Brave Face on It

A Pivotal Moment for Cyber Insurance

Using The Android USB Driver To Extract Data As USB Mass Storage Device

Mercedes Benz Data Breach details

Critical CISO Initiatives for the Second Half of 2021

DarkSide ransomware funded by cybercriminal ‘investors’

Kentucky Healthcare System Exposes Patients’ PHI

EA Ignored Domain Vulnerabilities For Months Despite Warnings And Breaches

SolarWinds Hackers Breach New Victims

NFC Flaws Allow ATM Hacking With A Wave Of A Phone

GitHub Bug Bounty Payouts Surge Past $1.5 Million

Microsoft Edge Vulnerability Could’ve Allowed Hackers to Steal Files

Smart VPN Mode | Avast

Telecoms at MWC stake claim to a digital future

Quick Hits

Android: How to enable the Password Checkup feature

REvil Hits Brazilian Healthcare Giant Grupo Fleury

Lil’ skimmer, the Magecart impersonator

What is the WireGuard VPN protocol?

Tips to Improve Cybersecurity Amidst Cyber Physical Attack

Boost performance with NVIDIA Magnum IO GPUDirect Storage

Seamless EU-UK Data Flows to Continue Following Adequacy Decisions

Microsoft investigates threat actor distributing malicious Netfilter Driver

Snapchat Aware of Latest App Store Update Causing App Crash, Promises Fix Soon

Gartner report recommends a smart approach to enterprises needing to incorporate data privacy capabilities to manage evolving regulatory guidelines

FIN7 Hacking Group’s Supervisor Gets 7-Years in Jail

Zyxel Firewalls and VPN Servers: Victims of a New Cyberattack

Is it game over for VR advergaming?

Mercedes-Benz USA Says Vendor Exposed Customer Information

The Role of Encryption in Protecting LGBTQ+ Community Members

Deals: B&H Photo ‘Mega Deal Zone’ Sale Includes Savings on Beats Flex and Other Accessories

Ransomware Attack on Wolfe Eye Clinic Exposes Data of 500k Patients

Reported HMRC-Branded Phishing Scams Grew by 87% During COVID-19

Hive Ransomware Gang Targets Software Provider Altus Group

Grupo Fleury Medical Facility, French Connect Fashion Brand Suffered Ransomware Attack

Vulnerabilities In Dell SupportAssist Could Allow Flashing BIOS

EA ignored domain vulnerabilities for months despite warnings and breaches

Microsoft Edge Bug Could’ve Let Hackers Steal Your Secrets for Any Site

Apple TV+ Epic Saga ‘Foundation’ Based on Isaac Asimov’s Best-Selling Novels Premieres September 24

SEPA Cyberattack Full Recovery Could Take Years

A Cisco ASA Vulnerability Is Actively Exploited

The OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer

Google Continues Support for Third-Party Cookies Until 2023

Microsoft Confirms New NOBELIUM Activity

GitHub Paid Out Over $1.5 Million via Bug Bounty Program Since 2016

One Year as Duo’s First Content Designer

Extending Zero Trust Security to Industrial Networks

Telegram Gains Group Video Calling and Screen Sharing Support

What Is Cybersecurity Compliance? An Industry Guide

FCW Insider: June 28, 2021

Cybersecurity study: SolarWinds attack cost affected US companies an average of $12 million

XSS Vulnerability in Cisco Security Products Exploited in the Wild

Microsoft: SolarWinds Hackers Continue to Target IT Companies

Zyxel Warns Customers About Hackers Targeting its Firewalls & VPN Devices

Windows Malware that Mines for Crypto ‘Crackonosh’ Used by Hackers to Infect Gamers’ PCs

Cybersecurity Leaders Scramble to Decipher SBOM Mandate

Detecting unknown threats: a honeypot how-to

Using CVE-2020-9971 to escape Microsoft Office’s app sandbox

Netfilter Rootkit Malware Infiltrates Into Microsoft’ Security Systems: the Gaming Community Targeted

Microsoft says new breach discovered in probe of suspected SolarWinds hackers

The builder for Babuk Locker ransomware was leaked online

Data Breach Involving Mercedes-Benz Exposes SSNs and Credit Card Numbers

Poltergeist Attack Targets Self-Driving Cars, Blinding Them Via Audio Signals

NordVPN Review – A Trusted Provider Offering The Best Speeds

Surfshark Review: A Robust Online Privacy Solution

Review: 6 top videoconferencing services put to the test

China’s Envision Invests In French EV Battery Factory

Court Denies HSBC Publication Ban In Meng Wanzhou Case

Own an old WD My Book Live? Disconnect it from the internet right now

Mercedes Benz Data Leak Includes Card and Social Security Details

Apple’s Online Store in India Drives Significant Shipment Growth in Q1 2021

Apple Begins Preparation for iPhone 13 Production Ahead of Fall Launch

Nobelium Cybercriminals Compromise Microsoft Customer Support to Target Its Customers

How to Stop iCloud Calendar Spam

MyBook Live Drives Are Being Completely Erased

Sensitive Defense Documents Found at Bus Stop

Parents in Australia Warned to ‘Keep AirTags Away From Children’ Due to Battery Swallowing Risk

A week in security (June 21 – June 27)

Are hackers getting rich by using gamers?

15 top open-source intelligence tools

Four states propose laws to ban ransomware payments

Mobile World Congress Returns To Barcelona With ‘Hybrid’ Event

SolarWinds Hackers Steal Microsoft Customer Data

Anticipate, Respond & Adapt: Organizational Resilience

Former Health Secretary Faces Probe Over Use of Personal Emails

Redesigned Apple Watch Series 7 Could Prioritize Longer Battery Life Over Additional Sensors

GitHub bug bounties: payouts surge past $1.5 million mark

Cyber Workforce: Gender Diversity Challenges

Cybersecurity Challenges in the Construction Industry

NewsBlur Restores Service After Hacker Wipes Database

Apple Watch Series 7 Could Prioritize Longer Battery Life Over Additional Sensors

Hackers Use Cracked Games To Make Crypto-Millions

Ratings Agency Warns Over El Salvador Bitcoin Move

Personal Information of Over 200,000 Students Leaked

FIN7 Cybercrime Boss Gets 7-Year Jail Sentence

New Variant of IcedID Banking Trojan Spreading Wildely

Hackers Trick Microsoft Into Signing Netfilter Driver Loaded With Rootkit Malware

AWS BugBust Challenge: A global competition for developers to identify and fix software bugs

Trying to register your antivirus in Windows Security Center?

Brothers Deny Involvement In $3.6bn South African Bitcoin ‘Heist’

Modern CyberSOC – A Brief Implementation Of Building a Collaborative Cyber Security Infrastructure

Ministry of Defence employee charged in child pornography case

DMARC: The First Line of Defense Against Ransomware

XDR Demands a New Approach to Security—and Business

Hackers are Remotely Erasing Western Digital Hard Drives

Atlassian Patched Vulnerabilities in its Domains

Cisco ASA Flaw Under Active Attack After PoC Exploit Posted Online

Data Clean Rooms for Innovation and Collaboration

Six typosquatting packages in PyPI repository laced with crypto miner

Microsoft support agent and some basic customer details hit by SolarWinds attackers

EU, U.S. Partner on Malware, Cybersecurity Defense

Navigating the complexity of ransomware negotiations

How do I select a big data solution for my business?

Was UK health secretary love scandal an exposure of Chinese Espionage through hidden Cameras

Amazon acquires Encrypted Communication App Wickr

A closer look at Google Workspace privacy and data security

How IoT is keeping businesses connected in an expanding network

Kuo: iPhone 13 Pro Models to Feature Improved Ultra Wide Camera With Autofocus, Compared to Current Fixed-Focus Lens

USB threats could critically impact business operations

Technical certifications demand growing, most IT employees have at least one

Many companies believe it is important to protect employee privacy, yet few are effective in doing so

Technical certifications demand growing, most employees have at least one

SolarWinds Hackers Breach Microsoft Customer Support to Target its Customers

SMEs strongly positioned in the data protection sector

ISC Stormcast For Monday, June 28th, 2021 https://isc.sans.edu/podcastdetail.html?id=7560, (Mon, Jun 28th)

Tufin Rule Lifecycle Management App simplifies and manages the rule certification process

YouTube blocked testimonials about missing Uyghurs in China: Report

SolarWinds hackers breach new victims, including a Microsoft support agent

A well-meaning feature leaves millions of Dell PCs vulnerable

WD My Book Live users wake up to find their data deleted

Here’s what you’ll need to upgrade to Windows 11

VisibleRisk appoints three new executives to its leadership team

Microsoft signed a driver called Netfilter, turns out it contained malware

The SOC Technology Stack: XDR, SIEM, WAF, and More

Sweeping executive order covers diversity, inclusion, equity and accessibility in the federal workforce

IT Security News Weekly Summary – Week 25

IT Security News Daily Summary 2021-06-27

DIY CD/DVD Destruction, (Sun, Jun 27th)

How the United States Can Compete with Chinese Influence in Southeast Asia

NOBELIUM Hackers Gain Access To The Microsoft Networks via Hacked Employee Computer

The Case for Open XDR – X Means Everything

How to Protect Yourself Online when Browsing the Dark Web?

The Common Reasons Behind Hacking-What Motivates them to do it?

How to Do a Successful Reverse Phone Lookup?

No more hide and seek with the Magento 2 Elasticsearch module

What’s Your Fail-Safe Posture? Before You Learn How to Fly, Learn How to Fall

Western Digital My Book Live hard drives remotely wiped by hackers

This Malware Generated $2 Million After Abusing 222,000 Windows Systems

Mark Gurman: Apple Exploring iPads With Larger Displays

Brave Browser Launches a Beta Version of Their New Search Engine

Crackonosh Monero miner made $2M after infecting 222,000 Win systems

800+ Million WordPress Users Records Leaked Online

How to Make Sure Your Browser Extensions Are Safe

Security Affairs newsletter Round 320

Microsoft said an Attacker had Won Access to its Customer-Service Agents

Crackonosh Malware Exploits Windows Safe Mode to Mine Cryptocurrency Secretly

Researcher Managed to Hack ATMs Using His Phone’s NFC & Android App

Hackers target Cisco ASA devices after a PoC exploit code was published online

Week in review: Preventing ransomware attacks, SOC burnout, and customizing your ATT&CK database

Penetration testing

Multilingual Cybersecurity Awareness Training adapted for your needs

(ISC)² Offers Free Access to Ransomware Education | #RANSOMWAREWEEK

Magic in Cybersecurity: Magic links to replace the password

Taos unveils service to help companies accelerate containerized application environment adoption

Apple Shares List of Products to Keep Safe Distance Away From Pacemakers

Zettaset XCrypt Kubernetes Encryption now available on the VMware Marketplace

Generated on 2021-06-28 23:55:30.010210